Network Security Essentials: Applications and Standards, 6th edition

Published by Unknown (July 28, 2016) © 2017

  • William Stallings

eTextbook

per month

  • Anytime, anywhere learning with the Pearson+ app
  • Easy-to-use search, navigation and notebook
  • Simpler studying with flashcards
$122.66

  • Hardcover, paperback or looseleaf edition
  • Affordable rental option for select titles

uCertify

from$140.00

  • Includes the full Pearson e-text, pre- and post-assessments, quizzes, videos, and more
  • Provides hands-on skills to bridge conceptual knowledge and real-world application
  • Powerful student management tools yet easy to implement, customize, and manage

For courses in Corporate, Computer and Network Security .

Network Security: Innovations and Improvements

Network Securities Essentials: Applications and Standards introduces students to the critical importance of internet security in our age of universal electronic connectivity. Amidst viruses, hackers, and electronic fraud, organizations and individuals are constantly at risk of having their private information compromised. This creates a heightened need to protect data and resources from disclosure, guarantee their authenticity, and safeguard systems from network-based attacks.

The Sixth Edition covers the expanding developments in the cryptography and network security disciplines, giving students a practical survey of applications and standards. The text places emphasis on applications widely used for Internet and corporate networks, as well as extensively deployed internet standards.   

Network Securities: Applications and Standards provides the following features to facilitate learning:

UPDATED! The text includes the most recent innovations in a comprehensive coverage of the field.

  • UPDATED! Professors in the field have reviewed this book since the last edition to clarify and tighten the narrative and improve illustrations.
  • NEW! Chapter on network access control includes a general overview of the topic plus discussions of the Extensive Authentication Protocol and IEEE 802.1X.
  • NEW! Section on cloud security covers the security issues related to cloud computing.
  • NEW! Online chapter on SHA-3 discusses the new cryptographic hash standard, which was adopted in 2012.
  • NEW! Section on mobile device security introduces this essential aspect of enterprise network security.
  • UPDATED! Chapter on malicious software now focuses on backdoor/rootkit malware more commonly installed by social engineering attacks, rather than more classic direct infections like viruses and worms.
  • NEW! Sample Syllabi guide instructors in using the text for a limited amount of time.
  • NEW! Learning Objectives begin each chapter.  

The text is organized into three parts to help students better retain core subjects

  • Part I: Cryptography presents a concise survey of the cryptographic algorithms and protocols underlying network security applications, including encryption, hash functions, message authentication, and digital signatures.
  • Part II: Network Security Applications covers important network security tools and applications such as key distribution, Kerberos, X.509v3 certificates, Extensible Authentication Protocol, S/MIME, IP Security, SSL/TLS, IEEE 802.11i WiFi security, and cloud security.
  • Part III: System Security looks at system-level security issues including the threat of countermeasures for malicious software and intruders and the use of firewalls.

UPDATED! The text includes the most recent innovations in a comprehensive coverage of the field.

  • UPDATED! Professors in the field have reviewed this book since the last edition to clarify and tighten the narrative and improve illustrations.
  • Chapter on network access control includes a general overview of the topic plus discussions of the Extensive Authentication Protocol and IEEE 802.1X.
  • Section on cloud security covers the security issues related to cloud computing.
  • Online chapter on SHA-3 discusses the new cryptographic hash standard, which was adopted in 2012.
  • Section on mobile device security introduces this essential aspect of enterprise network security.
  • UPDATED! Chapter on malicious software now focuses on backdoor/rootkit malware more commonly installed by social engineering attacks, rather than more classic direct infections like viruses and worms.
  • Sample Syllabi guide instructors in using the text for a limited amount of time.
  • Learning Objectives begin each chapter.  

Brief Contents

  1. Introduction

Part I: Cryptography

  1. Symmetric Encryption and Message
  2. Public-Key Cryptography and Message
  3. Key Distribution and User Authentication
  4. Network Access Control and Cloud Security
  5. Transport-Level Security
  6. Wireless Network Security
  7. Electronic Mail Security
  8. IP Security

Part III: System Security

  1. Malicious Software
  2. Intruders
  3. Firewalls

APPENDICES

  • Appendix A Some Aspects of Number Theory
  • Appendix B Projects for Teaching Network Security

Dr. William Stallings has authored 18 titles, and counting revised editions, over 40 books on computer security, computer networking, and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE, ACM Computing Reviews and Cryptologic.

He has 13 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association.


In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products.

He created and maintains the Computer Science Student Resource Site at ComputerScienceStudent.com. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology.


Dr. Stallings holds a Ph.D. from MIT in Computer Science and a B.S. from Notre Dame in electrical engineering.

Need help? Get in touch

Pearson+

All in one place. Pearson+ offers instant access to eTextbooks, videos and study tools in one intuitive interface. Students choose how they learn best with enhanced search, audio and flashcards. The Pearson+ app lets them read where life takes them, no wi-fi needed. Students can access Pearson+ through a subscription or their MyLab or Mastering course.

uCertify

The Pearson uCertify Courses and Labs combine Pearson's authorized and peer-reviewed content with uCertify's accessible, flexible, and scalable online learning platform. All Courses and Labs are mapped directly to Pearson texts to make integration into your current courses easy and convenient

The uCertify Courses are a foundational learning tool and come with the complete Pearson interactive e-text, pre- and post- assessments, quizzes, exercises, tests, instructional videos, and more. The uCertify Labs and Simulators provide hands-on skills and bridge the gap between conceptual knowledge and real-world application

Video
Play
Privacy and cookies
By watching, you agree Pearson can share your viewership data for marketing and analytics for one year, revocable by deleting your cookies.

Pearson eTextbook: What’s on the inside just might surprise you

They say you can’t judge a book by its cover. It’s the same with your students. Meet each one right where they are with an engaging, interactive, personalized learning experience that goes beyond the textbook to fit any schedule, any budget, and any lifestyle.Â